Research Article Performance Optimization for Delay-Tolerant and Contention-Based Application in IEEE Networks

Size: px
Start display at page:

Download "Research Article Performance Optimization for Delay-Tolerant and Contention-Based Application in IEEE Networks"

Transcription

1 Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2008, Article ID , 14 pages doi: /2008/ Research Article Performance Optimization for Delay-Tolerant and Contention-Based Application in IEEE Networks Fei Yin and Guy Pujolle LIP6, Pierre et Marie Curie University, 104 Avenue du President Kennedy, Paris, France Correspondence should be addressed to Fei Yin, Received 25 January 2008; Accepted 5 June 2008 Recommended by Jong Hyuk Park IEEE standard suite defines the air interface specifications for fixed and mobile broadband access in wireless metropolitan area networks. Although the IEEE MAC has been well defined by various bandwidth allocation and scheduling mechanisms to support QoS for different applications, efficient bandwidth allocation still remains as an open issue. We analyze and develop a mathematical model to evaluate the performance of the contention-based and delay-tolerant applications in IEEE networks. We focus our attentions on allocating the uplink bandwidth efficiently, the basic goal is to optimize the performance with an optimal bandwidth allocation mechanism. The results of our analysis lay out clearly that a maximum uplink throughput and a minimum number of pending bandwidth request transmission can always be acquired by optimizing the contention period size in a frame. This optimal size is also influenced by the number of terminals in the network, which is also analyzed in the later part of the paper. Our results can be used for providing probabilistic throughput guarantee and determining the optimal contention period. Copyright 2008 F. Yin and G. Pujolle. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 1. INTRODUCTION Broadband wireless access (BWA) has gained a particular attention during the past few years. The widely successful IEEE wireless LAN (WLAN) technologies are suitable for an indoor BWA solution but are not well suited for outdoor BWA applications. In response to this need, the IEEE is set up to develop a new standard for BWA applications. IEEE is an emerging suite of air interface standards combing fixed, portable, and mobile BWA specifications. The first IEEE standard, , is the original fixed wireless broadband air-interface specification in the GHz frequency band for lineof-sight (LOS) only wireless services. The a was completed in 2003 to extend the standard in the 2 11 GHz for non-line-of-sight (NLOS) wireless broadband services. The final revision of fixed BWA standard, IEEE [1], which appeared in 2004, defines the air interface and medium access control (MAC) protocol for a current fixed wireless metropolitan area network, intended for providing high bandwidth wireless voice, video, and data for residential and enterprise in licensed and license-exempt frequencies bands for both line-of-sight and non-line-of-sight. IEEE e [2] amendment, appeared in 2005, extends the to support not just fixed, but also portable and mobile operation. In IEEE system, two kinds of stations (fixed or mobile) are defined: base station (BS) and subscriber station (SS). The BS coordinates all the communication in the network. The SS can deliver voice, video, and data using common interface. IEEE standards support two operational modes: a mandatory point-to-multipoint (PMP) mode, and an optional mesh mode. In a PMP topology network, a centralized BS is capable of connecting multiple SSs to various public networks linked to the BS, the traffics can only occur between the BS and SSs. In the mesh mode, the SSs can also serve as routers by cooperative access control in a distributed manner. The communication between BS and SSs has two directions: uplink (from SSs to BS) and downlink (from BS to SSs). The downlink transmission is on a broadcast basis from the BS to all SSs, while the uplink bandwidth is shared by SSs on a demand basis. Both uplink

2 2 EURASIP Journal on Wireless Communications and Networking and downlink can operate in different frequencies using frequency division duplexing (FDD) or at different time using time division duplexing (TDD). Figure 1 illustrates an example of general architecture of IEEE networks. The fixed or mobile customer premise equipments (CPEs) connect to the central BS, the BS receives transmissions from multiple sites and sends to internet directly or via other BSs. End users (laptop, telephone, computer,..., etc.) inside the building, through inbuilding networks such as Ethernet or WLAN, can connect to an outside CPE and then link to the IEEE network. Resource management and allocation mechanisms are crucial to guarantee quality-of-service (QoS) performance in IEEE networks. A polling-request-grant mechanism is defined in IEEE MAC for efficient bandwidth allocation in uplink channel from multiple SSs to a central BS. In a PMP network, the SS first has to utilize an allocated polling interval to request uplink bandwidth before transmitting data in a corresponding bandwidth grant. This means that if an SS wants to do uplink transmission, it first sends a request to BS during the polling interval. On receiving the request from an SS, the BS should determine and grant to the SS the bandwidth, which is used by the SS to transmit the data. The IEEE defines two main methods for SSs to send their bandwidth request messages: unicast polling, and contention-based polling including multicast or broadcast polling. In the first case each SS station is polled individually by the BS to send the request; in the latter all SSs contend to obtain transmission opportunities for sending requests using contention resolution mechanisms. The IEEE MAC is designed to be capable of accommodating a variety of traffics, including data, voice, and video. Then four scheduling service classes are defined to support different QoS requirements for kinds of applications: unsolicited grant service (UGS), real-time polling service (rtps), non-real-time polling service (nrtps), and best effort (BE). The IEEE physical layer (PHY) supports time division multiple access (TDMA) for uplink channel access and each uplink channel is divided into a number of time minislots. These minislots are allocated in a MAP message to the SSs for the different propositions. Even rounded bandwidth allocation and scheduling mechanisms are defined in the IEEE standard, the efficiency of the mechanisms are still left to deliberate. A scheme that can efficiently allocate bandwidth to guarantee the QoS performance is essential in IEEE networks. In this paper, we focus on evaluating IEEE performance with efficient bandwidth allocation mechanisms for nrtps and BE services. We want to find out an optimal bandwidth allocation to optimize the performance. Besides, the performance influenced by the network size is also investigated in our analysis. The rest of the paper is organized as follows. In Section 2 we give some general insights on the MAC operation of IEEE Based on the overview, in Section 3, we discuss the problem of maximizing the uplink data throughput by setting an optimal contention period in a frame. We also present the related works in performance optimization in IEEE in Section 4.InSection 5 we present the system model while Section 6 addresses performance analysis through our mathematic model. We also address the simulation results in Section 7 and present the concluding remarks in Section OVERVIEW OF IEEE MAC In this section, we give a brief overview of some technical aspects of IEEE MAC protocols: the frame structure, the bandwidth allocation process, and the uplink service classes. The problem statement and the analysis in the later sections largely depend on these basic operations of the MAC protocol Frame structure The frame in IEEE standard is modeled as a stream of minislots, which help to partition the bandwidth easily, and is divided into two subframes: downlink subframe and uplink subframe. According to different duplexing techniques, the downlink and uplink transmission occur in FDD mode or TDD mode. Figure 2 shows the overall frame structure of the IEEE MAC with TDD. A TDD frame has a fixed duration and contains one downlink and one uplink subframe. The downlink subframe is generally broadcast and starts with preamble, downlink MAP (DL-MAP), and UL-MAP (Uplink MAP). The preamble is used by the PHY for synchronization and equalization. The DL-MAP and UL-MAP contain the correlative information of the intervals usage in the following downlink and uplink subframes, respectively, and are broadcast to all SSs. The following downlink bursts carry the data to transmit to SSs, and a transmit/receive time gap (TTG) in the end of the bursts to separate the downlink subframe from the uplink subframe. In a UL-MAP, the BS may specify some uplink intervals as the opportunities for new SSs to join the channel by requesting the basic management connection identifiers (CIDs), by adjusting its power level and frequency offsets and by correcting its time offset; other intervals as the request information elements (IEs) for authorized SSs to competitively request uplink bandwidth; and another intervals as the uplink bandwidth grants in which particular SSs transmit data or uniquely request bandwidth. Correspondingly, the uplink subframe is divided into chunks of minislots for the purpose of initial ranging, bandwidth request, and data transmission. Specifically, the request IEs allocated for contention request are composed by transmission opportunities (TOs). A TO is defined as an allocation provided in a UL-MAP or part thereof intended for a group of SSs authorized to transmit bandwidth requests [1]. This group may include either all SSs or a multicast polling group of SSs having bandwidth request for a transmission. The number of TOs associated with a particular IE in a MAP depends on the total size of the allocation as well as the size of an individual transmission. The BS will always allocate bandwidth for contention IEs in integer multiple TOs.

3 F. Yin and G. Pujolle 3 Home with external CPE Home with portable CPE BS Mobile client BS Office building Hotspot Piont-to-multipoint BS Fixed backhaul Figure 1: IEEE network architecture. Internet Frame j 2 Frame j 1 Frame j Frame j +1 Frame j +2 Slots allocation in uplink Downlink subframe Uplink supframe Preamble DL-MAP UL-MAP DL burst 1 DL burst n TTG Initial ranging period Contention request period Data transmission period RTG Slots allocation in downlink Request IE 1 Transmission Transmission opportunity 1 opportunity k Request IE n SS 1 scheduled data SSTG SSTG SS n scheduled data Preamble Bandwidth request message SSTG Minislot Figure 2: Frame structure of IEEE MAC Polling-request-grant bandwidth allocation procedure In a PMP network, the BS controls all transmissions in the uplink and the downlink. For uplink access, a Polling- Request-Grant mechanism is defined for bandwidth allocation during a certain duration. Figure 3 shows the overall procedure. Initially, the SSs who have new connections need to get an admission into the network from the BS through an admission control mechanism which is vendor-dependent and does not specify in this paper. According to the QoS

4 4 EURASIP Journal on Wireless Communications and Networking BS SS i SS k New connection inform New connection inform New connection admited confirmation New connection admited confirmation Polling (unicast, multicast, broadcast) Polling (unicast, multicast, broadcast) Bandwidth request (uniquely, competitively) Bandwidth request (uniquely, competitively) Bandwidth grant Bandwidth grant Data uplink transmission Data uplink transmission Figure 3: Polling-request-grant process. parameters of connections in SSs, the BS has to poll the admitted SSs by allocating bandwidth specifically for the purpose of making bandwidth requests. Depending on the connections service classes and the residual bandwidth in the BS side, these polling intervals may address to individual SSs (unicast polling) or to groups of SSs (multicast/broadcast polling). The SSs then utilize these request IEs to uniquely or competitively request uplink bandwidth for each connection to make a reservation with the BS. On receiving the requests, the BS allocates chunks of minislots in the coming MAP as the bandwidth grants to the SSs, which should take into account the requirements from all authorized SSs and the available bandwidth in the uplink subframe. The bandwidth grant is aggregated into a single grant to the SS and not to the on-requesting connections. Typically, the SS decodes the received UL-MAP and determines the honored connections to transmit data. This bandwidth allocation technique in the IEEE standard is called Polling-Request-Grant procedure. The SS will assume that the transmission has been unsuccessful if no bandwidth grant has been received in a specific timeout, T16 [1], or if a shorter one than expected is received. Then a contention resolution process is started and retransmission of unsuccessful bandwidth request will be implemented by the SS Scheduling service classes Scheduling services represent the data-handling mechanisms supported by the MAC scheduler for data transport on a given connection. The IEEE MAC provides QoS differentiation for the different types of applications that operate over networks, through four defined scheduling service types. This classification facilitates bandwidth sharing between different users as follows. (i) The UGS is designed to support real-time service flows that generate fixed-size data packets on a periodic basis, such as T1/E1 and Voice over IP (VoIP) without silence suppression. In this service, the BS offers fixed-size data grants on a real-time periodic basis, which eliminate the overhead and latency of SS requests and assure that grants are available to meet the flow s real-time needs. The mandatory QoS service parameters are maximum sustained traffic rate, maximum latency, tolerated jitter, and request/transmission policy [1]. (ii) The rtps is designed to support real-time service flows that generate variable-size data packets that are issued at a periodic intervals, such as Moving Pictures ExpertsGroup(MPEG)video.TheBSprovidesperiodic unicast polling opportunities, which meet the flow s real-time needs and allow the SS to specify the size of the desired grant. This service requires more request overhead than UGS, but supports variable grant sizes for optimum data transport efficiency. The mandatory QoS service parameters are maximum reserved traffic rate, maximum sustained traffic rate, maximum latency and request/transmission policy [1]. (iii) The nrtps is designed to support delay-tolerant service flows that generate variable-size data packets for which a minimum data rate is requested. The BS offers unicast polling opportunities on a regular basis, which assures that the service flow receives request opportunities even during network congestion. In addition, the SS is also allowed to use contention request opportunities. The mandatory QoS service parameters are maximum reserved traffic rate, maximum sustained traffic rate, traffic priority, and request/transmission policy [1]. (iv) The BE is designed to support data streams for which no minimum service level is required and therefore may be handled on a space-available basis. The SS may use contention request opportunities as well as unicast request opportunities when the BS sends any. The mandatory QoS service parameters are maximum sustained traffic rate,traffic priority, and request/transmission policy [1]. As shown in Figure 4, among these four service classes, UGS is prohibited from any polling, rtps connections can only use unicast polling intervals to transmit bandwidth requests, nrtps connections may adopt a mandatory unicast polling and an optional contention-based polling, while BE connections adopt a mandatory contention-based polling and do not have any unicast polling obligation. Specially, in nrtps, the BS first has to poll the SSs by unicast polling, and then switch to contention-based polling only when no sufficient residual bandwidth to support unicast polling. Then we refine these four service classes into two major types: the UGS and the rtps are delay-sensitive and contentionfree services; the nrtps and the BE are delay-tolerant and

5 F. Yin and G. Pujolle 5 contention-based services. In this paper, we only consider the delay-tolerant and contention-based applications. UGS Fixed size packets 3. PROBLEM STATEMENT In wireless network, because of the limited bandwidth and the expensive radio spectrum, the demand of performance optimization became more and more critical. In most situations, the optimization target is to get a higher throughput and/or lower delay system. For the delay-tolerant and contention-based applications in IEEE , the delay is not a key QoS parameter, then the uplink throughput across a set of fixed or mobile SSs stands out as the most important performance figure. According to the Polling-Request-Grant mechanism, in a fix-size uplink subframe, we know that uplink throughput is affected by the number of bandwidth grants allocated to SSs, which is controlled by the size of contention request period and the available bandwidth in data transmission period. It is well known that the different allocation of minislots exhibit very different efficiency. Based on Figure 2, we know that the contention request period and data transmission period are interactional. (i) If the size of contention request period is very small, there are few TOs that can be utilized to transmit the bandwidth requests. Many requests may be queued in the buffer, and might be dropped depending on the implementation policy of the request queue. In this case, only a small quantity of bandwidth requests are successfully received by the BS. On the other hand, though the data transmission period is very large, the BS can only allocate few bandwidth grants to SSs in one frame based on the received requests. There are some minislots in data transmission period are idle and make a waste of bandwidth. The result of this allocation leads to a very low uplink throughput. (ii) If the size of contention request period is very large, numerous bandwidth requests are successfully received by the BS. However, the available bandwidth in the data transmission period is very small and is deficient to fit all the bandwidth requests. Then, only a few bandwidth requests could be granted. And then little bandwidth might be allocated to SSs to do the uplink transmission in one frame, which results in a low uplink throughput. We must be absorbed in the efficiency of the bandwidth allocation to get a performance optimization in IEEE networks. To do it, an efficient combination of polling, request, and grant mechanisms to optimize the contention request period size is necessary, which may achieve a tradeoff between the number of bandwidth requests and the number of bandwidth grants and then maximize the uplink throughput. Furthermore, the optimal size of contention request period is dependent on the network size, since the tradeoff varies with the number of SSs in the network. rtps nrtps BE Periodic time intervals Variable size packets Periodic time intervals Variable size packets Regular time intervals Variable size packets Completely nondeterministic time intervals Contention-based polling Unicast polling Packets Figure 4: Uplink scheduling service classes. 4. RELATED WORKS Time Time Time Time In recent years, many related works have studied the performance optimization for wireless networks. Benelli et al. [3] analyzed the optimal frame size according to the number of users and the number of collided packets in a slotted aloha multiple access radio mobile network. Bianchi [4] contributed in a simple but extremely accurate analytical model to compute the maximum and saturation throughput in IEEE distributed coordination function (DCF) networks. His conclusion shows that maximum performance can be achieved by adaptively tuning the value of backoff window size depending on the network size. This is also proved in Bianchi et al. [5]. As for the IEEE networks, by now few scientific results have been obtained to optimize the performance by efficient bandwidth allocation mechanisms. Chu et al. [6] proposed an efficient QoS architecture to provide QoS guarantees for IEEE system. An idea of adopting a contention slot allocator (CSA) to dynamically adjust the ratio of the contention request period and the data transmission period is presented in the article. Their study analysed, in theory, that the CSA had significant impact on the system performance and there should be a tradeoff in the design of the CSA. They also suggested that an algorithm to fully utilize the bandwidth needs to be developed. But the

6 6 EURASIP Journal on Wireless Communications and Networking authors did not give out any algorithms of how CSA works and how to calculate the ratio. Cho et al. [7] also proposed a new QoS architecture of IEEE , in which an uplink bandwidth allocation scheduling mechanism is adopted. Their work focuses on the request throughput optimization mostly, whose objective is to maximize the number of bandwidth requests successfully transmitted in the contention request period. In order to obtain a maximum number of requests, the authors take the backoff windows size into account and want to find an optimum value. After mathematic deductions, the authors concluded that the maximum request throughput could be achieved with the backoff windows size which is equal to the number of competing SSs. However, the conclusion is biased and not exactly right in IEEE networks, in which maximizing the number of successful bandwidth requests could not always lead to an optimum uplink throughput. As discussed in Section 3, we know that, in IEEE network, the uplink throughput depends on not only the number of bandwidth requests, but also the number of bandwidth grants. An optimal tradeoff between requestsand grants should be found in order to get a maximum uplink throughput. The research on optimizing the performance of nrtps and BE applications running in IEEE network is supported by Oh and Kim [8]. The main objective is to find out an optimal contention request period for the number of users in the system, in order to guarantee the throughput and delay. In their article, the authors first explained the relation between the contention request period and the delay, and stated that it is essential to find an optimal period. In order to stochastically analyze the performance, they redid the definition of the throughput and delay. They also analyzed that the throughput and delay are tradeoff of each other and it is difficult to find the optimal point, then a new parameter, cost function, is introduced by the author to evaluate the performance. (i) Throughput is the ratio of the number of successfully transmitted requests and the total number of transmitted requests, which in fact is the request throughput for newly generated requests. (ii) Delay is the time spent until a new bandwidth request successfully transmits, which in fact is the request delay for newly generated requests. (iii) Cost function is the ratio of throughput and delay which indicates that the optimal value could be obtained when the throughput is large and the delay is small. After some mathematic deduction, the authors concluded that the optimal size of the contention period is achieved when the cost function reaches a maximum value. In their study, the value is 2M 1 slots, where M is the number of SSs in network. However, there are some points need to be improved and be more accurate in their research. First, the objective of the authors is to find out an optimal contention request period to get an optimum tradeoff between throughput and delay, and then to optimize the performance, but their analysis results in an optimal frame size. They did the analysis by assuming that the bandwidth requests can be uniformly distributed in a frame duration, which actually took the whole frame duration as the contention request period. Consequentially, the following mathematic deductions are based on the frame size but not a particular contention request period size. Deducing by the mathematic formulas in the article, we got the results that the 2M 1 slots are the frame size. Second, the throughput and delay defined in the article are request throughput and request delay, which cannot accurately evaluate the performance in IEEE network. Same as the problem in [7], the uplink data throughput and delay cannot be represented only by the number of successfully transmitted requests, but should involve the affection caused by the number of bandwidth grants into consideration. Third, the request throughput and delay should be composed of two parts: the throughput and delay caused by newly generated requests and by unsuccessful requests. The unsuccessful requests include the collision and non-granted requests produced in the former frame duration, which should be retransmitted in the current frame and highly influence the performance and then affects the optimal frame size. In this article, the author only focuses on the newly generated requests but ignores the others, which is not right in real situation. Fourth, in their work, the authors assumed that M SSs produced M bandwidth requests to transmit, which is far from being realistic because in practice the SSs will sporadically generate such packets of nrtps and BE applications. It would be necessary to relax this assumption. Fifth, as shown in Section 2.3, in nrtps and BE applications, the throughput is a mandatory QoS parameter but the delay is not, there is no necessary to introduce cost function as a key parameter to evaluate the performance. In our paper, we concentrate on the performance optimization only for the delay-tolerant and contentionbased applications runs in IEEE networks, in the assumption of fixed and finite number of SSs. We analyze the uplink data throughput and the pending competitive bandwidth requests in uplink channel by efficiently combining request and grant allocation strategies together. In our analysis, we introduce a random process for bandwidth request generation in the network during a frame time horizon, and the bandwidth requests caused by newly generated and unsuccessful transmitted are both considered. We also provide a simple, nevertheless accurate, analytical model to compute an optimal contention request period, by which maximum uplink throughput and minimum pending competitive transmission are obtained. The influences of different network size on the optimal contention period are also investigated in our analysis. 5. SYSTEM MODEL Let us consider a PMP system in which there are one BS and V SSs. An example of model of the uplink subframe structure with a realization of request arrivals occurring over a frame j is presented in Figure 5. The interarrival time of requests for

7 F. Yin and G. Pujolle 7 Bandwidth request arrivals Initial ranging period I j Uplink subframe F j Contention request period C j Data transmission period D j Initial ranging opportunities Contention transmission opportunities SS 1 scheduled data SSTG SSTG SS n scheduled data RTG BR n BR i BR k Idle transmission opportunity Successful transmission opportunity Collision transmission opportunity Figure 5: Analysis system model. uplink bandwidth reservation is assumed to follow a general distribution with a positive and finite mean. We denote F j, in minislots, the size of the uplink subframe of frame j. The uplink subframe is divided into chunks of minislots as initial ranging period I j, contention request period C j, and data transmission period D j : F j = I j + C j + D j. (1) The contention minislots are all clustered adjacently at each uplink subframe. This allows easier implementation at both the BS and the SSs because both devices have to switch to the contention mode only once at each frame period. In the system model, there are three possible TO allocations when there are multiple SSs. (i) The collision TOs is a certain number of TOs on which more than two bandwidth requests are simultaneously transmitted, means that a transmission collision will occur on these TOs. (ii) The successful TOs are a part of TOs on which only one request is transmitted, means that the bandwidth request will be successfully transmitted. (iii) The idle TOs are some empty TOs on which all bandwidth requests refrain from transmitting. The competing SSs randomly select TOs to transmit bandwidth requests. When more than one SS start simultaneously bandwidth request transmission in the same TOs, a collision occurs. The collided bandwidth requests should be retransmitted. After receiving the successful bandwidth requests, the BS allocates chunks of minislots in the data transmission period as the bandwidth grants to the SSs. If the available bandwidth in data transmission period is not sufficient to fit all the bandwidth requests received by the BS, some requests may not be granted in the coming frame, and are scheduled in BS side. These non-granted requests should be retransmitted when the SSs do not receive any grants in a predefined time. Finally, the SSs transmit uplink data during the corresponding allocated intervals. For ease of analysis, we assume the following. (i) The number of SSs in system is fixed to V during operation period. (ii) The V SSs is divided into M groups for the purpose of multicast polling during operation period. (iii) The uplink subframe size is fixed to F minislots during operation period. (iv) The bandwidth requests issued from the SSs in the network are Poisson distributed during a frame time horizon. (v) The uplink bandwidth requests are fixed to R minislots (occupying one TO) and are uniformly distributed during contention request period in a frame. (vi) The collided and non-granted bandwidth requests are retransmitted in the next frame if SSs do not receive any grants in the coming frame. (vii) All bandwidth requests successfully transmitted during contention period should be received by the BS. 6. PERFORMANCE ANALYSIS The core contribution of this paper is the analytical evaluation of the optimal contention period to optimize the performance. The analysis is divided into two distinct parts. First, we analyse the uplink throughput and the pending bandwidth requests, and obtain the optimal contention period C opt. Then, we study the influence to the C opt which is depending on the network size. Since we want to analyse the performance for delaytolerant and contention-based application, then we take

8 8 EURASIP Journal on Wireless Communications and Networking contention-based polling mechanism into account, where the SSs should be multicast or broadcast polled. In generalization, we divide the V SSs into M multicast groups, then each group includes V/M SSs. In multicast polling, the BS averagely assigns TOs to each group and the probability that each group attains the TOs is 1/M. LetN j be the number of TOs the BS assigns to each group in frame j, then we have N j = Cj R M. (2) Let t j be the number of pending bandwidth requests transmits in the contention period during frame j in a multicast group. Since the bandwidth requests are uniformly distributed in contention request period, its distribution will converge to a binomial distribution for N j. Based on the definition in [9], the probability that r in t j bandwidth requests transmit in one TO during frame j is p(r) = ( ) tj r p r (1 p) tj r, (3) where p is the probability that a request is assigned to a particular TO. Since the distribution is uniform, we find substitute the p in (3), and we get p(r) = ( ) tj ( 1 r p = 1 N j (4) N j ) r (1 1 Nj ) tj r. (5) The expected number of contention TOs in which r bandwidth requests transmit are E(r) = N j p(r) ( ) tj ( 1 = N j r N j ) r (1 1 Nj ) tj r. (6) We can thus identify three contributions in TO allocation. (i) The successful TOs in which bandwidth requests are said to be successfully transmitted, where r = 1. Then, during frame j, in a multicast group, the number of TOs in which bandwidth requests are successfully transmitted is S j = N j p(1) ( ) tj ( ) 1 1 = N j (1 1 ) tj 1 1 Nj N j = t j ( 1 1 N j ) tj 1. (7) transmission collision generated is t j B j = N j p(r) r=2 t j ( ) tj ( 1 = N j r=2 r N j ) r (1 1 Nj ) tj r. (8) (iii) The idle TOs is that in which bandwidth requests refrain from transmitting, where r = 0. The number of TOs in which no bandwidth request transmitted is H j = N j p(0) ( ) tj ( ) 1 0 = N j (1 1 ) tj 0 Nj N j = N j (1 1 N j ) tj. Since one successful TO only holds one bandwidth request, then we can get the number of successfully transmitted bandwidth request equal to S j. One collision TO contains simultaneously more than two bandwidth requests. To obtain the number of collided bandwidth requests in the frame j, x j, we multiply (8) by the number of bandwidth request in a particular TO in which collision occurs. Hence, t j x j = rb j r=2 t j ( ) tj ( ) 1 r = rn j (1 1 ) tj r r=2 r N j Nj ( = t j t j 1 1 ) tj 1. N j (9) (10) Since the requests newly generated in network are Poisson distributed during a frame duration, then we get the probability l requests issued by the SSs during a minislot time horizon: p in (l) = λl e λ, (11) l! where λ is the average number of requests generated by the SSs per minislot duration in network. Consequently, the probabilities 0, 1 and more than 2 requests issued in a minislot duration are p in (l = 0), p in (l = 1) and p in (l>1), respectively, p in (l = 0) = e λ (ii) The collision TOs in which requests are said to be in collision, where r 2. The number of TOs in which p in (l = 1) = λe λ p in (l>1) = 1 e λ λe λ. (12)

9 F. Yin and G. Pujolle 9 Let n be the number of bandwidth requests newly generated in network during a frame, then we get Since, and hence, n = lfp in (l) l=0 ( ) = F 0p in (0) + 1p in (1) + lp in (l) l=2 ( = F λe λ + l λl e λ l! l=2 ). l λl e λ λ = λ (l 1) e λ l! (l 1)! l=2 (l 1)=1 = λ ( 1 λ0 e λ ) 0! = λ ( 1 e λ) (13) (14) n = F ( λe λ + λ ( 1 e λ)) = Fλ. (15) Then we get the number of pending bandwidth requests in a multicast group during frame j +1is t j+1 = Fλ + x j + k j, (16) where k j is the number of non-granted bandwidth requests in one group during frame j +1. The corresponding bandwidth grants to the S j bandwidth requests in frame j will be allocated in frame j +1.Let C j+1 and D j+1 be the contention request period and the data transmission period in the frame j+1, respectively; letx j+1 be the number of bandwidth grants allocated to all SSs in D j+1, and letq i be the size of uplink data packet corresponding to the ith grant (in minislot), then we get M X j+1 = G z, (17) z=1 where G z is the number of grants in the zth multicast group. We can thus identify three cases in performance evaluation related to the history of bandwidth requests S j that are successfully transmitted in the previous frame and to the number of bandwidth grants G j+1 produced in the current frame S j >G j+1 In this case, let C 1 j+1 and D 1 j+1 be the contention request period and the data transmission period in frame j +1, respectively. The D 1 j+1 is deficient to grant all the M S j bandwidth requests, only X 1 j+1 requests can be granted by BS. Then, the uplink data throughput is equal to the total size of X 1 j+1 bandwidth grants, and then equals the data transmission period D 1 j+1 in frame j +1: X 1 j+1 T Sj>G j+1 = D 1 j+1 = Q i, X 1 j+1 <M S j. i=1 (18) Then, the number of non-granted bandwidth requests in a multicast group during frame j +1is k 1 j = S j G 1 j+1. (19) We can get that the number of pending bandwidth request transmitting in a group during frame j +1is 6.2. S j <G j+1 t 1 j+1 = Fλ + x j + k 1 j = t j + ( Fλ G 1 j+1). (20) In this case, the contention period and the data transmission period in frame j+1 are C 2 j+1 and D 2 j+1,respectively.thed 2 j+1 is so large that all M S j bandwidth requests are granted by BS. Furthermore, some minislots (D 2 j+1 M S j i=1 Q i )areidle and do not use to grant the requests. Then, the uplink data throughput is equal to the total size of M S j bandwidth grants, and then less than the data transmission period D 2 j+1 in frame j +1: T Sj<G j+1 = M S j i=1 Q i <D 2 j+1. (21) There are no non-granted bandwidth requests, k 2 j = 0. Then, the number of pending bandwidth request transmission in one group during frame j +1is 6.3. S j = G j+1 t 2 j+1 = Fλ + x j + k 2 j = t j + ( Fλ S j ). (22) In this case, the contention period in frame j +1isC 3 j+1, the data transmission period D 3 j+1 is large enough that all minislots exactly are used to grant all M S j bandwidth requests. Then, the uplink data throughput is equal to the total size of M S j bandwidth grants, and then then equals the data transmission period D 3 j+1 in frame j +1: T Sj =G j+1 = M S j X 3 j+1 i=1 Q i, D 3 j+1 = Q i, i=1 M S j = X 3 j+1. (23)

10 10 EURASIP Journal on Wireless Communications and Networking There is no non-granted bandwidth requests k 3 j = 0, and no idle minislots in D 3 j+1. Then, the number of pending bandwidth request transmission t 3 j+1 in one group during frame j + 1 is the same as in Section 6.2, 6.4. Results analysis t 3 j+1 = Fλ + x j + k 3 j = t j + ( Fλ S j ). (24) Based on the above analysis, we got the results of the uplink data throughput and pending bandwidth requests in three different situations. Comparing (18), (21), and (23), we can get that M S j >X 1 j+1, T Sj =G j+1 = T Sj<G j+1 >T Sj>G j+1. Comparing (20), (22), and (24), we can get that (25) S j >G 1 j+1, (26) t 3 j+1 = t 2 j+1 <t 1 j+1. Then, higher uplink throughput and less pending bandwidth request transmission in frame j +1canbeachievedin Sections6.2 and 6.3. However, a further analysis of the uplink throughput and pending bandwidth request transmission in frame j + 2 leads to a strong difference between Sections6.2 and 6.3. During frame j + 1, among the three cases, we can obviously get the result based on (18), (21), and (23), Based on (1)and(2), we can get D 1 j+1 <D 3 j+1 <D 2 j+1. (27) C 1 j+1 >C 3 j+1 >C 2 j+1, N 1 j+1 >N 3 j+1 >N 2 j+1. (28) As we know, the function S = t(1 (1/N)) t 1 is a continuous and monotone increasing function with respect to N.Then,wecangetS 3 j+1 >S 2 j+1. Applying (21), (22), (23), and (24), we can get the following results: t 3 j+2 = Fλ + t 3 j+1 S 3 j+1 <t 2 j+2 = Fλ + t 2 j+1 S 2 j+1, T Sj+1=G j+2 = M S 3 j+1 i=1 Q i >T Sj+1<G j+2 = M S 2 j+1 i=1 Q i. (29) Then, we concluded that the maximum uplink throughput and the minimum pending transmission can be obtained by optimizing the contention request period size C opt. This optimal size could make the number of bandwidth requests successfully received by BS in former frame be equal to the number of bandwidth grants allocated to SSs in current frame: ( S j = t j 1 R M ) tj 1 = G j+1, (30) where G j+1 = X j+1 /M. C optj Since the bandwidth requests indicate the uplink bandwidth, the SSs make the reservation from the BS, then the BS knows the bandwidth grants size Q i for each request, and then the G j+1 can be calculated based on the information of the size of data transmission period D j+1 and the size of bandwidth grant Q i : X j+1 D j+1 = F C optj+1 I j+1 = Q i. (31) Furthermore, Abi-Nassif et al. [10] developed an estimation scheme to measure the number of requests in a data over cable service interface specification (DOCSIS) [11] system. (DOCSIS specification is developed by Cable Television Laboratories as the major industry standard for two-way communication over hybrid fiber/coax (HFC) cable plants. The DOCSIS MAC is strikingly similar to IEEE MAC, since IEEE standard is developed based on IEEE and DOCSIS.) However, their study assumed the number of retransmitted requests to be negligibly small compared to the number of new requests, which do not reflect the real situation. To solve the problem, Yin and Lin [12] proposed a statistically optimized minislot allocation algorithm to maximizes the request minislot throughput by estimating the number of new requests with a timeproportional scheme and the number of collided requests by looking up a statistical most likelihood number of requests table. The scheme drives the request minislot throughput to the optimal bound by accurately estimating the number of requests and allocating that number of minislots to resolve them. The schemes from the above research can also be used here to estimate the t j in our analysis. Then, we can calculate and thus set the optimal contention period in any frame j: C optj = 6.5. Optimal contention period for the different number of SSs i=1 R M 1 ( X j+1 /M t j ) 1/(tj 1). (32) Now we know that the optimal contention period C opt is achieved when S j = G j+1. However, the S j varies with the t j when a C opt is configured and exhibits an unstable behavior. In particular, as shown in Figure 6, astincreases, the S j increase to a maximum value, further increases of t lead to an eventually significant decrease of S j.inordertofindout this maximum value, we take the derivative of S j with respect to t, and imposing the derivation equal to 0: ( d S = 1 1 ) t 1 + t( 1 1 ) t 1 ( ln 1 1 ) = 0. d t N opt N opt N opt (33) Then, we get the t when the S j is maximum: t max = 1 ln ( N opt / ( )). (34) N opt 1

11 F. Yin and G. Pujolle 11 The number of successfully transmitted bandwidth requests S X: 10 Y:3.874 X:20 Y:7.547 X:30 Y:11.22 Table 1: The simulation parameters. Upstream channel capacity QPSK, 2.56 Mbps Time covered by MAP 10 milliseconds Minislot size 50 μsec Contention slots minislots Bytes per minislot 16 Backoff window start 1 Backoff window end 8 Upstream scheduling service Nonreal time polling Piggyback Disabled The number of pending bandwidth requests t N = 10 N = 20 N = 30 Figure 6: The number of successful transmission with N = 10, 20, 30. If ln(n opt /(N opt 1)) is developed in Taylor series and assume that N opt is large enough, then we can get t max = N opt = C opt R M. (35) We know that the variety of network size will change the value of λ, which will change the n, and then changes the t. As the S varies with the t and the C opt depends on the condition S j = G j+1, then the optimal contention period size should be dynamically adapted with different network size in order to get better performance. In the following parts, we will analyse the influence to the C opt and the maximum uplink data throughput caused by the network size. Suppose C optj and C optj+1 are the size of optimal contention period in frame j and j + 1, respectively, then we know S j = G j+1 and the maximum uplink throughput is T = M Sj i=1 Q i. We thus analyse the influence from the network size in two cases as follows t<c opt /(R M) In this case, new SSs entry during the time of frame j increases the value of t j and makes the S j increase. Then, we get the situation where S j >G j+1. In order to keep the best performance, the G j+1 in the frame j + 1 has to increase to get a new tradeoff S j = G j+1, which makes the configured C optj+1 to decrease to a new value C opt j+1 < C optj+1.under this condition, the maximum uplink throughput in frame j + 1 also increased to T = M S j i=1 Q i. The above process will continue with the new SSs entering the network, until the condition t = C opt /R is reached t>c opt /(R M) In this case, new SSs entry during the time of frame j makes the S j decrease. Then, we know that S j <G j+1.inorderto maintain the best performance, the C optj+1 in frame j + 1 has to increase to a new value C opt j+1 >C optj+1, making G j+1 to decrease to get a new tradeoff S j = G j+1. The maximum uplink throughput is also decreased to T = M S j i=1 Q i.the above process will continue with the new SSs entry. 7. SIMULATION RESULT This section presents the performance evaluation of IEEE networks by simulation and then validates our analytical model. We report on the simulation results and make the observation. We only present a limited number of cases here. However, we find that the conclusions we draw here are generally true for many other cases we have evaluates. We build an IEEE simulation network by using OPNET [13] simulator with DOCSIS module. Table 1 shows the simulation parameters. The nrtps service class is adopted, the unicast polling is defined impossible during the simulation time and the piggybacking of bandwidth request is prohibited, which makes the SSs must only use contention request TOs to request bandwidth. It has to indicate that, during the simulation with DOCSIS module, the actual time covered by MAP may be different with the configured MAP size specified in Table 1. The actual time covered by MAP during simulation is calculated as the sum of time required for the configured contention slots, UGS grants, and reservation for requests. During the simulation, if the actual time calculated by the BS is less than the configured time, the BS will make up the missing time by padding some slots to the actual MAP size [13]. This additional slots are considered as contention slots and are added to the contention request period. That makes the actual size of contention request period bigger than the configured size in our simulation. Figure 7 shows the actual size of contention request period in our simulation. Unless otherwise specified, the contention slots in the following figures represent the actual slots in contention request period. We first do the simulation to calculate the number of bandwidth requests successfully transmitted and the number

12 12 EURASIP Journal on Wireless Communications and Networking Actual contention slots Configured contention slots Figure 7: The actual contention slots versus the configured contention slots, V = 10. Bandwidth requests/grants in one MAP (packets/s) X: Y:1.903 S j = G j Actual contention slots Bandwidth requests in one MAP Bandwidth grants in one MAP Figure 8: The bandwidth request versus the bandwidth grants of one multicast group during one MAP, V = 10. of bandwidth grants in a network with 10 SSs. Figure 8 shows results. The x-axis is the actual contention slots and the y- axis is the number of requests and grants during one MAP time. The figure displays the sensitivity of the requests and grants with contention slots in one MAP. We can observe that the number of bandwidth requests monotonously increases with the increase of contention slots, while the number of bandwidth grants monotonously decreases with the increase of contention slots. This indicates that, in IEEE networks, the unilateral increase of the number of bandwidth requests may not always increase the uplink throughput and sometimes make it worse, which is similar to what we discussed in Section 4. We can also observe that the number of bandwidth grants reaches the maximum, where the number of corresponding bandwidth requests is equal to the number of bandwidth grants, S j = G j+1. Showed in the figure, this size of contention request period is 171 slots. Note that, in Figure 8, there is no zone where the number of bandwidth requests less than the number of bandwidth grants, which are discussed in our mathematical model as the case S j <G j+1. On the contrary, we find that there is a zone but not a point where S j = G j+1. We also notice that the contention slots begin from 171 slots but not 0 slot as it is shown in Table 1. That is reasonable. The case S j < G j+1 is not a stable status in our simulation. If we set the configured size of contention request period C con j+1 and data transmission period D con j+1 to make S j < G j+1, then the BS only allocates S j bandwidth grants to SSs. This means that the actual data transmission period D act j+1 = M S j i=1 Q i is less than the configured size D con j+1 = M G j+1 i=1 Q i. Then, the actual frame size F act = I j+1 + C con j+1 + D act j+1 less than the configured size F con = I j+1 + C con j+1 + D con j+1. According to the definition of OPNET DOCSIS module, some minislots should be added into the actual MAP as the contention slots to make up the missing time, where F act = F con = I j+1 + C act j+1 + D act j+1. These additional contention slots increases the configured contention request period, then increases the value of S j. Along with the simulation going, the value of S j increases until S j = G j+1 or S j >G j+1. At that time, all the slots in data transmission period are utilized as the bandwidth grants and no idle slots exist. The value of S j does not increase any more, the simulation system is steady. That makes clear why the case S j <G j+1 doesnotexistbutaportionofs j = G j+1 exists, and it also well explains why the actual contention slot in the x-axis begins from 171 slots instead of 0 slot. After the portion of S j = G j+1, we go into the period S j >G j+1,in which the number of bandwidth requests increases but the number of bandwidth grants decreases with the increase of contention slots. To investigate the uplink throughput with different size of contention request period, we present the simulation results in Figure 9. Thex-axis is the actual contention slots and the y-axis is the uplink throughput which is represented by the number of packets transmitted in uplink channels per second. The uplink throughput monotonously decreases with the increase of contention slots, and the maximum value is arrived when the contention period is 171 slots. It shows that the maximum uplink throughput could always be achieved by determining an optimal contention request period, where we can also get S j = G j+1. For the sake of finding out the pending bandwidth request transmission on a contention period basis, we do the simulation to calculate the number of collision requests and the number of non-granted requests with different contention periods. We present the simulation results in Figure 10, the x-axis is the actual contention slots and the y-axis is the sum of the number of collision and non-granted requests. We observed that the number of retransmitted bandwidth request monotonously increases with the increase of contention slot, and the minimum value is got when the contention period is 171 slots. It lays out that the minimum number of pending bandwidth requests might always be achieved when an optimal contention period is adopted. A conclusion can be made based on the above simulation results. In a PMP IEEE network, the maximum uplink data throughput and the minimum number of pending bandwidth requests could always be achieved when an optimal contention period is determined by the BS. Further more, during this optimal contention period, the number of

Flexible Resource Allocation in IEEE Wireless Metropolitan Area Networks

Flexible Resource Allocation in IEEE Wireless Metropolitan Area Networks Flexible Resource Allocation in IEEE 802.16 Wireless Metropolitan Area Networks Spyros A. Xergias, Nikos Passas and Lazaros Merakos Communication Networks Laboratory Department of Informatics & Telecommunications

More information

Preliminary Performance Evaluation of QoS in DOCSIS 1.1

Preliminary Performance Evaluation of QoS in DOCSIS 1.1 The University of Kansas Technical Report Preliminary Performance Evaluation of QoS in DOCSIS 1.1 Gayathri Chandrasekaran, Mohammed Hawa and David W. Petr ITTC-FY2003-TR-22736-01 January 2003 Sponsor:

More information

Delay Analysis of IEEE Wireless Metropolitan Area Network

Delay Analysis of IEEE Wireless Metropolitan Area Network Delay Analysis of IEEE 802.16 Wireless Metropolitan Area Network Zsolt Saffer Technical University of Budapest 1521 Budapest Hungary safferzs@hit.bme.hu Sergey Andreev State University of Aerospace Instrumentation

More information

A Heuristic Strategy for IEEE WiMAX scheduler for Quality of Service

A Heuristic Strategy for IEEE WiMAX scheduler for Quality of Service A Heuristic Strategy for IEEE 802.16 WiMAX scheduler for Quality of Service G.S. Paschos, I. Papapanagiotou, C.G. Argyropoulos and S.A. Kotsopoulos Wireless Telecommunication Laboratory Electrical and

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

Cover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message

Cover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message Cover Page 1. Title of Paper Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message 2. Name of the authors, Sung-Han Park, and Jae-Hyun Kim 3. About authors Affiliation

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

Upstream Scheduler Mode Configuration for the Cisco ubr CMTS

Upstream Scheduler Mode Configuration for the Cisco ubr CMTS Upstream Scheduler Mode Configuration for the Cisco ubr CMTS Document ID: 69704 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Upstream Scheduling in

More information

On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network

On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE 802.16 based WiMAX Network Vinit Grewal Department of Electronics and Communication Engineering National Institute of Technology

More information

SS Initialization Overview

SS Initialization Overview SS Initialization Overview Downlink Sync Auth. Key Xchange Get Uplink Parameters Setup Time Ranging Register Download Configuration File Capability Negotiation DHCP Setup connection and service flow (provisioned

More information

Performance Evaluation of WiFiRe using OPNET

Performance Evaluation of WiFiRe using OPNET Performance Evaluation of WiFiRe using OPNET Under the guidance of: Prof. Sridhar Iyer and Prof. Varsha Apte Dept. of CSE (KReSIT) July 16, 2007 Goal Goal Building. Finding minimum slot length to support

More information

MAC layer: structure and QoS support. PhD student: Le Minh Duong

MAC layer: structure and QoS support. PhD student: Le Minh Duong 802.16 MAC layer: structure and QoS support PhD student: Le Minh Duong Content 1. Introduction 2. 802.16 MAC layer 2.1. MAC Service-Specific Convergence Sublayer 2.2. Common Part Sublayer 3. QoS support

More information

New Contention Resolution Schemes for WiMAX

New Contention Resolution Schemes for WiMAX New Contention Resolution Schemes for WiMAX Jesús Delicado,QiangNi, Francisco M. Delicado and Luis Orozco Barbosa Instituto de Investigación en Informática de Albacete (I 3 A) Universidad de Castilla La

More information

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 82.16 System Woo-Jae Kim 1, Joo-Young Baek 1, Sun-Don Lee 1, Young-Joo Suh 1, Yun-Sung Kim 2, and Jin-A Kim 2 1 Department of Computer

More information

MAC Overview NCHU CSE WMAN - 1

MAC Overview NCHU CSE WMAN - 1 MAC Overview NCHU CSE WMAN - 1 MAC Overview Connection-oriented Supports difficult user environments High bandwidth, hundreds of users per channel For variable Continuous and Burst traffic Very efficient

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX

A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX Abdalla A\ Alrahman Mohamed Abdalla 1, Dr. Amin Babiker A\ Nabi 2, Dr. Ashraf A. Osman 3 1,2,3 Department of communication,

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Implementation of WiFiRe PHY Sectorization in OPNET

Implementation of WiFiRe PHY Sectorization in OPNET P Sreedhar Reddy Roll No. 06305024 24th July, 2007 Under the Guidance Of Prof. Sridhar Iyer Department Of Computer Science and Engineering Indian Institute Of Technology, Bombay Outline WiFiRe overview.

More information

Priority Based Uplink Scheduling Scheme for WiMAX Service Classes

Priority Based Uplink Scheduling Scheme for WiMAX Service Classes I.J. Information Technology and Computer Science, 213, 8, 66-74 Published Online July 213 in MECS (http://www.mecs-press.org/) DOI: 1.5815/ijitcs.213.8.7 Priority Based Uplink Scheduling Scheme for WiMAX

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Evaluating VoIP using Network Simulator-2

Evaluating VoIP using Network Simulator-2 Athens University of Economic and Business Evaluating VoIP using Network Simulator-2 June 2007 Author: Papantonakos Manos Supervisor Prof.: George Xylomenos Co-Supervisor Prof: George Polyzos About WiMax

More information

WiMAX: MAC Layer Performance Assessments

WiMAX: MAC Layer Performance Assessments WiMAX: MAC Layer Performance Assessments A. Bestetti,G.Giambene, S. Hadzic Alcatel-Lucent, Via Trento, 30, I-20059 Vimercate, Milano, Italy University of Siena, Via Roma, 56, I-53100 Siena, Italy Abstract

More information

Request Mechanisms to Reduce the Contention Period in : A Comparison

Request Mechanisms to Reduce the Contention Period in : A Comparison Request Mechanisms to Reduce the Contention Period in 82.6: A Comparison Jesús Delicado, Francisco M. Delicado and Luis Orozco Barbosa Instituto de Investigación en Informática de Albacete (I 3 A) Universidad

More information

Wireless Communication. IEEE Wireless Metropolitan Area Network (wman)

Wireless Communication. IEEE Wireless Metropolitan Area Network (wman) 1 IEEE 802.16 Wireless Metropolitan Area Network (wman) 2 Existing Data Network Hierarchy Level Typical Connections Wired Technologies Wireless Technologies Personal Area (PAN) Peripherals and personal

More information

PREFACE. The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie ( )

PREFACE. The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie ( ) PREFACE The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie (1888-1964) The recent standard IEEE 802.16 for fixed Broadband Wireless Access (BWA)

More information

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

UPLINK SCHEDULING FOR SUPPORTING PACKET VOICE TRAFFIC IN IEEE BACKHAUL NETWORKS

UPLINK SCHEDULING FOR SUPPORTING PACKET VOICE TRAFFIC IN IEEE BACKHAUL NETWORKS UPLINK SCHEDULING FOR SUPPORTING PACKET VOICE TRAFFIC IN IEEE 802.16 BACKHAUL NETWORKS UPLINK SCHEDULING FOR SUPPORTING PACKET VOICE TRAFFIC IN IEEE 802.16 BACKHAUL NETWORKS By LIZHONG DAI, B. Eng. Beijing

More information

IEEE Broadband Wireless Access Working Group < Changes in Definition of Data Delivery Services

IEEE Broadband Wireless Access Working Group <  Changes in Definition of Data Delivery Services Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Changes in Definition of Data Delivery Services 25-June-2004 Source(s) Re: Vladimir Yanover et al

More information

Evaluation and Comparaison of Scheduling Algorithms in Wimax Networks

Evaluation and Comparaison of Scheduling Algorithms in Wimax Networks Evaluation and Comparaison of Scheduling Algorithms in Wimax Networks Abstract Kais Mnif * LETI laboratory, University of Sfax, Tunisia Ecole Nationale d Electronique et de Télécommunications (ENET COM)

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX

Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX Siddu P. Algur Departmentof Computer Science Rani Chennamma University Belgaum, India Niharika Kumar Department of Information

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Random access with adaptive packet aggregation in LTE/LTE-A

Random access with adaptive packet aggregation in LTE/LTE-A Zhou and Nikaein EURASIP Journal on Wireless Communications and Networking (2016) 2016:36 DOI 10.1186/s13638-016-0531-6 Research Open Access Random access with adaptive packet aggregation in LTE/LTE-A

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

The IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks

The IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks The IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks ITU-APT Regional Seminar Busan, Republic of Korea 10 Sept 2004 Ken Stanwood CEO, Cygnus Multimedia Communications Vice-Chair,

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation Mechanism

Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation Mechanism 2007-01-15 IEEE C802.16j-07/034r1 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation

More information

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes Syed R. Zaidi, Shahab Hussain, M. A. Ali Department of Electrical Engineering The City College of The

More information

Internet Traffic Performance in IEEE Networks

Internet Traffic Performance in IEEE Networks Internet Traffic Performance in IEEE 802.16 Networks Dmitry Sivchenko 1,2,3, Nico Bayer 1,2,3, Bangnan Xu 1, Veselin Rakocevic 2, Joachim Habermann 3 1 T-Systems, SSC ENPS, Deutsche-Telekom-Allee 7, 64295

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Solutions to Performance Problems in VoIP Over a Wireless LAN

Solutions to Performance Problems in VoIP Over a Wireless LAN Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular

More information

MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4

MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS 1999-10-29 Source Phil Guillemette SpaceBridge Networks Corporation

More information

ACLASS of users that has drawn much attention over the

ACLASS of users that has drawn much attention over the 296 IEEE TRANSACTIONS ON BROADCASTING, VOL. 56, NO. 3, SEPTEMBER 2010 Statistical Multiplexing of Upstream Transmissions in DOCSIS Cable Networks César Heyaime-Duvergé and Vasant K. Prabhu, Life Fellow,

More information

Comparison of the Quality of Service (QoS) on the IEEE e and the g Wireless LANs

Comparison of the Quality of Service (QoS) on the IEEE e and the g Wireless LANs ENSC 427: COMMUNICATION NETWORKS Comparison of the Quality of Service (QoS) on the IEEE 802.11e and the 802.11g Wireless LANs Spring 2010 Final Report Group 5 Yalda Hakki (yha17@sfu.ca) Rosy Johal (rja2@sfu.ca)

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks Chapter Overview Broadcast Networks All information sent to all users No routing

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Media Access Control Protocol Based on DOCSIS 1.1

Media Access Control Protocol Based on DOCSIS 1.1 Document Number: IEEE 802.16mp-99/16 Title: Media Access Control Protocol Based on DOCSIS 1.1 Date Submitted: 1999-11-08 Source: Karl Stambaugh Voice: 480-441-7842 Motorola Inc. Fax: 480-675-2116 8220

More information

TWO-STEP SCHEDULING ALGORITHM FOR IEEE WIRELESS NETWORKS

TWO-STEP SCHEDULING ALGORITHM FOR IEEE WIRELESS NETWORKS TWO-STEP SCHEDULING ALGORITHM FOR IEEE802.16 WIRELESS NETWORKS Mohamed. M. Elgazzar R&D Department, Cairo, Egypt, m_elgazzar1961@yahoo.com ABSTRACT This paper proposes a new scheduling algorithm for IEEE

More information

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered

More information

Design and analysis of MAC protocols for wireless networks

Design and analysis of MAC protocols for wireless networks Graduate Theses and Dissertations Graduate College 2009 Design and analysis of MAC protocols for wireless networks Haithem Al-mefleh Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/etd

More information

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656

More information

A General Frame Structure for IEEE802.16j Relaying Transmission

A General Frame Structure for IEEE802.16j Relaying Transmission Project IEEE 802.16 Multihop Relay Project < http://ieee802.org/16/relay/index.html > Title Date Submitted A General Frame Structure for IEEE802.16j Relaying Transmission 2007-01-08 Source(s) Yong Sun,

More information

IEEE Broadband Wireless Access Working Group < Evaluation Procedure for MAC Protocols

IEEE Broadband Wireless Access Working Group <  Evaluation Procedure for MAC Protocols Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Evaluation Procedure for 802.16 MAC Protocols 2000-04-25 Source Hoon Choi Natl. Inst. of Standards

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

Comparative Assessments for Different WiMAX Scheduling Algorithms

Comparative Assessments for Different WiMAX Scheduling Algorithms Proceedings of the World Congress on Engineering and Computer Science 9 Vol I WCECS 9, October -, 9, San Francisco, USA Comparative Assessments for Different WiMAX Scheduling Algorithms Ahmed H. Rashwan,

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

* Author to whom correspondence should be addressed; Tel.: ; Fax:

* Author to whom correspondence should be addressed;   Tel.: ; Fax: Future Internet 2010, 2, 446-468; doi:10.3390/fi2040446 Article OPEN ACCESS future internet ISSN 1999-5903 www.mdpi.com/journal/futureinternet Deficit Round Robin with Fragmentation Scheduling to Achieve

More information

An Efficient Call Admission Control for IEEE Networks

An Efficient Call Admission Control for IEEE Networks An Efficient Call Admission Control for IEEE 802.16 Networks Sarat Chandra and Anirudha Sahoo Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay, Powai, Mumbai, India

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

Initial PHY Layer System Proposal for Sub 11 GHz BWA

Initial PHY Layer System Proposal for Sub 11 GHz BWA Initial PHY Layer System Proposal for Sub 11 GHz BWA Document Number: 802.16.3p-00/40 Date Submitted: 2000-11-08 Source: Anader Benyamin-Seeyar Voice: (514) 822-2014 Harris Corporation Inc. Fax: (514)

More information

Cross Layer QoS Provisioning in Home Networks

Cross Layer QoS Provisioning in Home Networks Cross Layer QoS Provisioning in Home Networks Jiayuan Wang, Lukasz Brewka, Sarah Ruepp, Lars Dittmann Technical University of Denmark E-mail: jwan@fotonik.dtu.dk Abstract This paper introduces an innovative

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Effective Bandwidth Allocation for WiMAX Mesh Network

Effective Bandwidth Allocation for WiMAX Mesh Network Effective Bandwidth Allocation for WiMAX Mesh Network Hung-Chin JANG and Wei-Ching LIN Department of Computer Science National Chengchi University Taipei 11605 Taiwan R.O.C. ABSTRACT The aim of this paper

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks

A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks Han-Sheng Chuang 1, Liang-Teh Lee 1 and Chen-Feng Wu 2 1 Department of Computer Science and Engineering, Tatung

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

Quality of Service for wireless networks

Quality of Service for wireless networks How is QoS for wireless networks implemented? Analytical Network Project Master education in System and Network Engineering University of Amsterdam, the Netherlands ing. E. Hos hossie@chello.nl ing. N.

More information

NCTUns Simulation Tool for WiMAX Modeling

NCTUns Simulation Tool for WiMAX Modeling NCTUns Simulation Tool for WiMAX Modeling (Invited Paper) Shiang-Ming Huang smhuang@csnctuedutw Ya-Chin Sung ycsung@csienctuedutw Yi-Bing Lin liny@linycsienctuedutw Shie-Yuan Wang shieyuan@csienctuedutw

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Implementation and Evaluation of a MAC Scheduling Architecture for IEEE WirelessMANs

Implementation and Evaluation of a MAC Scheduling Architecture for IEEE WirelessMANs Implementation and Evaluation of a MAC Scheduling Architecture for IEEE 802.16 WirelessMANs by Abhishek Maheshwari Department of Computer Science and Engineering Indian Institute of Technology Kanpur May

More information

Qos Analysis Of Wimax Network

Qos Analysis Of Wimax Network Qos Analysis Of Wimax Network 802.16 Gurpal Singh Sidhu 1, Sandeep Kaushal 2, Dr. Vijay Kumar Banga 3 1 M-Tech scholar, Department of Electronics and Communication Engineering, Amritsar College of Engineering

More information

A Multi-Factor Scheduling Algorithm for WIMAX Systems

A Multi-Factor Scheduling Algorithm for WIMAX Systems A Multi-Factor Scheduling Algorithm for WIMAX Systems Ahmed H. El-Shinnawy, Mohamed M. Elgazzar, and Amin M.Nassar Abstract This paper proposes a new scheduling algorithm for IEEE 802.16-2005 Broadband

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

Providing QoS to Real and Non-Real Time Traffic in IEEE networks

Providing QoS to Real and Non-Real Time Traffic in IEEE networks Providing QoS to Real and Non-Real Time Traffic in IEEE 802.16 networks Joint work with my student Harish Shetiya Dept. of Electrical Communication Engg., Indian Institute of Science, Bangalore Overview

More information

Sujesh P. Lal VIT University, TN, INDIA

Sujesh P. Lal VIT University, TN, INDIA VoIP TRAFFIC SCHEDULING IN Sujesh P. Lal VIT University, TN, INDIA Introduction Popularity of Voice over IP (VoIP) applications such as Skype, Google Talk, and MSN Messenger along with emerging deployment

More information

Cross-Layer QoS Support in the IEEE Mesh Network

Cross-Layer QoS Support in the IEEE Mesh Network Cross-Layer QoS Support in the IEEE 802.16 Mesh Network Chun-Chuan Yang, Yi-Ting Mai and Liang-Chi Tsai Multimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.862

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations

A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations Yi-Neng Lin, Che-Wen Wu, Ying-Dar Lin National Chiao-Tung University Hsinchu, Taiwan Yuan-Cheng Lai National Taiwan

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Scheduling and CAC in IEEE Fixed BWNs: A Comprehensive Survey and Taxonomy

Scheduling and CAC in IEEE Fixed BWNs: A Comprehensive Survey and Taxonomy Scheduling and CAC in IEEE 802.16 Fixed BWNs: A Comprehensive Survey and Taxonomy Ikbal Chammakhi Msadaa, Daniel Câmara, and Fethi Filali EURECOM Mobile Communications Department 2229 route des crêtes,

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information